Thursday, September 05, 2013

Deeper Intelligence Shared More Widely via HP Vertica Harvests Gems for Guess Retail Strategy

Transcript of a BriefingsDirect podcast on how retailer Guess, Inc. has helped democratize data and speed up business decisions with HP Vertica.

Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: HP.

Dana Gardner: Hello, and welcome to the next edition of the HP Discover Performance Podcast Series. I'm Dana Gardner, Principal Analyst at Interarbor Solutions, your moderator for this ongoing discussion of IT innovation and how it’s making an impact on people’s lives.

Gardner
Once again, we're focusing on how IT leaders are improving their services' performance to deliver better experiences and payoffs for businesses and end users alike, and this time we're coming to you directly from the HP Discover 2013 Conference in Las Vegas.

Our next innovation case study interview highlights how retailer Guess, Inc. has used HP Vertica to both speed up and better distribute its big-data analytics capabilities.

We'll see how Guess can increasingly predict how to satisfy its shopping customers, and we'll specifically look at how Guess's IT organization came to grips with adopting and implementing a big-data platform to bring more of a democratization of data and better access to its employees.

To learn more about how Guess has slashed the latency between data gathering and actionable insights, please join me now in welcoming our guest, Bruce Yen, Director of Business Intelligence at Guess, Inc. [Disclosure: HP is a sponsor of BriefingsDirect podcasts.]

Bruce Yen: Dana, thanks for having me here. It's a pleasure to be here and be able to share what we’ve done with HP Vertica.

Gardner: Tell me why just plain, old relational databases and legacy IT weren’t doing the job for you.

Yen: About three years ago we began searching for a new database platform. We were hitting a lot of performance bottlenecks on our data loads and performance. We also saw the competitive landscape out there with lot of our competitors embracing alternative solutions to their traditional database platforms.

Gardner: What sort of requirements did you have to get to where you wanted to be?

Yen: The first thing was performance. We needed to improve the query performance. A lot of our users were asking us to do a lot of queries with very low-level detail inventory, and it was very costly from a performance standpoint to be able to serve those queries up. Some queries wouldn't even come back.

Secondly, from a performance standpoint, we wanted to make sure that a lot of our East Coast stores would be able to receive the reports early in the morning, and we were having problems just serving those up on a daily basis on time.

New solution

The last part was to support any kind of innovative analytics, any kind of cutting-edge analytics. We knew that that platform really wasn't going to help us do any of that. So we needed to find a new solution.

Gardner: Before we go any further into what that solution did for you, let's learn more about Guess. We know one of your popular and well-known products is your jeans, Guess Jeans, but there is more to it than that. Tell us a bit about the organization.

Yen
Yen: Guess has been around for more than 30 years now and we've grown from primarily a U.S. retailer into more of an international retailer.

If you look at the '80s, lot of people from the States remember us for the triangle on the jeans. We were primarily a wholesaler in the beginning. Now, we have over 1,600 stores worldwide, and about half of those are run by licensees. We sell a wide variety of lifestyle products, targeting primarily younger women in their late teens to early 30s.

Gardner: So it's critical to understand that market, and this is a dynamic market. People's tastes change and tastes are also, of course, different from area to area around the world. What have you gotten as a result of Vertica? Can you give me some of the key performance indicators that now demonstrate what you can do when you've got the right platform and the right data.

Yen: I like to look at it this way. First of all, it's foundational, the foundations for just baseline performance. Have we met those goals? With Vertica we have. We've been able to meet all of our service-level agreements (SLAs) and serve up the reports on time. Not only that, but now we're able to serve up the queries that we weren't able to do at all.
We've been able to meet our daily needs, but we've been able to set ourselves up to be competitive in this area.

When you move aside from the foundational, the next steps are analytics, being able to apply analytics and go through our data to figure out how we can apply best practices to see how we can gain a competitive advantage. We've been able to take our transactional data and look at ways of taking the stored data and applying that into our e-commerce site to get better product recommendations for our e-com customers. That’s something that we couldn't have done with our existing system.

We have our customer relationship management (CRM) system. We have our loyalty segmentation for which we use Vertica to do all of the analytics and we feed that data back into our CRM system. With the data volume that we have, we could not have done that with our old system.

So it's opened up new doors, but not only from a foundational standpoint. We've been able to meet our daily needs, but we've been able to set ourselves up to be competitive in this area.

Gardner: And has being able to gain the speed and handle the complexity prompted you to then seek out additional data to put into your analytics, so in a sense of not feeling limited as to where you can go and what information you could bring to bear?

Different data

Yen: Definitely. We've been looking at different things lately. We've been looking at different types of data -- loyalty data and customer data -- that we get from our customers.

In being able to give our users a holistic 360-degree view of what's happening from that customer standpoint, Vertica has been very critical in keep pace and enabling us to do that.

Gardner: Of course, it's important to get more data, manage it, and perform what you need to do with it. It's also important to deliver it in a way that people can use and to get to what we mentioned earlier about that democratization. Tell me how you've been able to deliver this out to more people and in an interface and device fashion that they really want.

Yen: That’s a great point. Everyone talks about big data these days, but big data, if you can't serve it up to people, if they can't use it, and if there's not a pervasive use of the data, is really useless.

We're pretty innovative in what we do from a mobile standpoint. For the last two years we've had an iPad app that's powered by the Vertica back end. We have this iPad app that over a 100 merchants in North America and Europe use.
The exciting thing is being able to see our users look at the data and make the decisions.

It's been able to take a lot of the data, a lot of the stores’ data, a lot of the selling information. It's allowed them to travel to the stores, be in meetings, or at home on the weekends, and they can look at the best-seller information. They can look at the sales and do it in a way that is actually fun.

It's not just a bunch of dashboards or reports that you open up and look at, but we've made it very interactive and we’ve created workflows in there. So that really draws the user into wanting to use that information and wanting to ask different questions.

Gardner: And for this combination of the power of the platform, the quality of the data, and this distribution capability, can you give us some metrics of business success? Where this has helped you. Do you have any concrete things you can point at and say it's really working and here is how?

Yen: We’ve looked at that in different ways. One of the initial points that we're analyzing in terms of return on investment (ROI), the easiest one is the amount of paper that’s being saved. You can count up the reams, how much they cost, and multiply that, and there is some significant saving there.

But that doesn’t really excite anyone. It's great that we've been able to save paper, but the argument is, well, you also had to buy new equipment. These iPads aren’t free and the mobile device management software and everything else that's associated to it is a new ecosystem. So there is a lot of new cost there.

The exciting thing is being able to see our users look at the data and make the decisions. Before, they would have to stop at a meeting and go back to their desks. That decision that takes an instant now used to drag on for two or three days, maybe even a week, and I've seen that in action.

It's done a good job

I can't give you an actual dollar figure, but I've seen them make decisions to change the allocation of certain items as they are looking at that information. As I was training some of our executives or power users, I would see them pick up the phone and actually make decisions to impact the business. So I know that it definitely has done a good job there.

The exciting thing is it's kind of democratized this information and this data and demystified it to a point where everyone can access it and everyone wants to access it. I’ve never seen users get so excited about a platform or an app. We've got emails saying, "Can I please have this app. I saw one of my coworkers using it. Could I please?" Before, we were never asked that way.

It was always, "Can I get a copy of that report. No big deal if I get it now or later." But here, people really, really want to use it, and we could tell that we hit something.

Gardner: It's always good when you're in IT and you're perceived as a hero and not something else. Let's talk about the IT experience. Earlier on, you had to go on relational databases and traditional legacy approaches to data. You went to a new platform. What was it like to install? Did this create some skills gap? How was this received, and how did you react in terms of your IT people?
The one thing that I'm proud of is that our team was able to conquer all of these hurdles, and also we had a great partner in Vertica.

Yen: Initially, we had to deal with just our internal IT folks being very skeptical. A lot of the claims, "30 to 300 to 400 times faster in performance," "you’re only going to need a quarter of a DBA," were the first two items where a lot of us were a little skeptical, myself included, but the performance has really proved itself.

Aside from that, we have to look at it more realistically. How do we implement a system like this? A lot of it has to do with changing the data loads, and that, in and of itself, takes a lot of time. That's one of the things that's always going to take a lot longer than we thought, and it would be a lot more challenging than we had initially anticipated.

The one thing that I'm proud of is that our team was able to conquer all of these hurdles, and also we had a great partner in Vertica. They were there with us in the trenches, even though we were the first retailer and we had a different use case than all of the other previous clients and customers that they had.

We took a chance with them, they took a chance with us, and it worked out. We were able to prove that their software works on a multitude of different use cases. As a retailer, we have a lot of updates with our data. This was three years ago. Their clients then, lot of the telcos and banks were just loading data, not really doing a lot of updates with it. They were doing a lot of queries with it and it was coming back fast, but not really transforming the data all that much. So we had a lot more use cases like that and they were able to come through for us.

Gardner: What about the future? Do you have a sense of taking this powerful capability and pointing it in new directions, perhaps into supply chain, the ecosystem of partners, perhaps even into internal operations? What's the next step?

Exciting times

Yen: It's actually exciting times, because Vertica has proved itself so well. It's also very cost-effective. One of the projects that we're working on right now is that we have a relational database for our MRP system. It's more of an ODS reporting system. We’re actively converting the ODS system, which is actually a replicated database of the relational database, into a Vertica database. We're able to kind of replicate, mimic the native database replication scheme on the relational side, and use Vertica for it.

It's a use case that we were a little skeptical about in the beginning. Could this be done in Vertica? We thought, the payoff would be great if we could do this on Vertica, the speed for performance, the storage footprint, would be amazing. So far, it's turned out very well for us. We’re still in the middle of it, but all things point to success there.

Gardner: Well great. I am afraid we’ll have to leave it there. We’ve been learning about how Guess Inc. has been using HP Vertica to both speed up and better distribute its big-data analytics capabilities.

And we’ve seen how Guess’s IT organization came to grips with adopting and implementing a big data platform to slash the latency between data gathering and actionable insights. So a big thank you to our guest, Bruce Yen, Director of Business Intelligence at Guess. Thanks a lot.

Yen: Thank you, Dana.

Gardner: And thanks also to our audience for joining us for this special HP Discover Performance Podcast coming to you from the HP Discover 2013 Conference in Las Vegas.

I'm Dana Gardner, Principal Analyst at Interarbor Solutions, your host for this ongoing series of HP sponsored discussions. Thanks again for joining, and come back next time.

Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: HP.

Transcript of a BriefingsDirect podcast on how retailer Guess, Inc. has helped democratize data and speed up business decisions with HP Vertica. Copyright Interarbor Solutions, LLC, 2005-2013. All rights reserved.

You may also be interested in:

Wednesday, September 04, 2013

Cybersecurity is a Necessity, Not an Option, in the Face of Global Security Threats, Says CSC

Transcript of a BriefingDirect podcast on the growing need for cybersecurity as an important organizational goal for businesses and government agencies.

Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: HP.

Dana Gardner: Hello, and welcome to the next edition of the HP Discover Performance Podcast Series. I'm Dana Gardner, Principal Analyst at Interarbor Solutions, your moderator for this ongoing discussion of IT innovation and how it’s making an impact on people’s lives.

Gardner
Once again, we're focusing on how IT leaders are improving security and reducing risks as they adapt to the new harsh realities of doing business online.

We have a fascinating discussion today, because we're joined for Part 2 of our series with HP strategic partner and IT services and professional services global powerhouse CSC. We'll be exploring how CSC itself has improved its own cybersecurity posture.

With that, please join me in welcoming our guests, Dean Weber, the Chief Technology Officer for CSC Global Cybersecurity. Welcome back, Dean.

Dean Weber: Thank you.

Gardner: We're also here with Sam Visner, Vice President and General Manager for CSC Global Cybersecurity. Welcome back to you too, Sam.

Sam Visner: Thanks, Dana, for this opportunity to discuss this topic.

Gardner: As you recall, in Part 1 of our series, we examined the tough challenges facing companies and how they need to adjust their technology and security operations. We saw how they were all now facing a "weapons-grade threat," as we put it, with big commercial incentives for online attacks and also a proliferation of more professional attackers. [Disclosure: HP is a sponsor of BriefingsDirect podcasts.]

We also learned how older IT security methods have proven inadequate to the escalating risks that are also expanding beyond corporate networks to include critical infrastructure, supply chains, and even down to devices and sensors.

So today, we'd like to take a deeper dive into how CSC itself is going beyond just technology and older methods to understand a better path to improve cybersecurity.

Let me start with you, Sam. What's the most impactful thing that CSC has done in the past several years, perhaps in concert with HP, that's proven to be a major contributor to a more secure environment?

Visner: There are three things to which I'd point. In the course of any conversation about three things, I'll think of a fourth, a fifth, a sixth, and a seventh in due course, but let me start with three things.

The first is the recognition that cybersecurity is an important issue for any organization today, whether they're a Global 1000 company, a Fortune 500 company, or a government agency, and everybody has a stake in cybersecurity.

Same question

The first thing is that, because everybody has this stake, there has been a recognition that the cybersecurity of the commercial world and the cybersecurity of the public sector are really the same question.

Visner
The commercial world provides the technology on which governments depend. Governments express the interest that the public has and the cybersecurity of those parts of the private sector that manage energy, transportation, critical manufacturing, aerospace, defense, chemicals, banking, healthcare, and any other thing that we call critical infrastructure.

In our company, where we serve both the public sector and private sector, we recognized early on that it made sense to address commercial and public sector cybersecurity from a common strategy. That's the first thing.

The second thing is that we then built a unified capability, a unified P&L, a unified line of business and delivery capability for cybersecurity that brings together our commercial and our public-sector business. We're end to end. So from consulting and assessments, then education, through managed cybersecurity services and systems integration, all the way through incident response, we make our full portfolio available to all our customer set, not just part of our customer set.

And the third thing is -- and I am going to ask Dean Weber to comment on this, because more than anyone else he has been the motivating powerhouse here -- a lot of people think about cybersecurity as tools. What's my firewall? What's my user provisioning? What's my password policy? How am I handling passwords? What should I be doing about endpoint protection?
That's a recipe for disaster, because you're always playing catch up against the problem and you don't even know if the tools work together.

That's a recipe for disaster, because you're always playing catch up against the problem and you don't even know if the tools work together. You certainly don't have the means to take the information that these tools generate, put them together, analyze them and give yourself the big picture that allows you to be effective in understanding the total threat you face and the total situation that you have internal in your organization.

The third thing that has been important is moving from a tools-based perspective to an architecture-based perspective, one in which before we buy tools or develop tools, or even in which we define offerings, we define the architecture of our offerings.

What are we trying to do? How will these offerings fit together in accruing information outside of our enterprise about the global threat environment and inside of an enterprise about everything that affects the security of an organization, from their smartphone, all the way down to their industrial control systems on the shop floor?

What are the offerings that, when knit together, give you a total capability? Then, what are the specific technologies that are pertinent to each of those offerings? So taking an architectural approach as opposed to a product-specific approach is the third basic development.

Again, the public sector and commercial sector have to be approached in a common strategy, the need to build a common organization serving all our customers across the CSC space, and approaching our solutions from an architectural perspective where you fit everything together in terms of offerings, capabilities, and technology. Those would be the three things to which I'd point.

Architectural level

Gardner: Dean Weber, let's get some more input on the shift from a tools perspective or a tactical perspective to that architectural level?

Weber: As Sam pointed out, the idea here is that we need an integrated capability to combat the current and emerging threats. You do that based on a global ability to detect and defer the threats, remediate as quickly as possible from threats that have manifested themselves, and recover.

Weber
Not only are we a services provider of managed security services to enterprise and government, we also consume those services ourselves on the inside. There's no difference. We drink our own champagne, or eat our own dog food, or however you want to put it.

But at the end of the day we have made this very security operations center (SOC)-centric offering, where we have elected to use a common technology framework across the globe. All of our SOCs worldwide use the same security and information event management -- SIEM technology, in this case HP ArcSight.

That allows us to deliver the same level of consistency and maturity, and given some of the advanced capabilities of ArcSight, it has allowed us to interconnect them using a concept we call the global logical SOC, where for data protection and data privacy purposes, data has to reside in the region or country of its origin, but we still need to share threat intelligence, both internally generated and externally applied. The ArcSight platform allows us to build on that basis.

Separate and apart from that, any other tools that we want to bring to bear, whether that's antivirus or vulnerability scanning, all the way up the stack to application security lifecycle, with a product like Fortify, we can plug all of that into the managed framework regardless of where it's delivered on the globe and we can take advantage of that appropriately and auditably across the entire hemisphere or across the entire planet.
The idea here is that we need an integrated capability to combat the current and emerging threats.

Visner: Dean mentioned HP Fortify. As you may know, we're bringing out an application security testing-as-a-service component of our portfolio. It’s an offering. That was done very deliberately. It's a portfolio of offerings that comprise a total capability. Each offering goes through offering lifecycle management to ensure that it conforms to the architecture, and then trade studies to determine which technologies, in this case the HP Fortify technology, are pertinent to that offering.

As we move out on this, what people should expect is not that somebody is going to show up and say, "Buy our tool." Instead, what we're going to be doing is soliciting requirements for tools and technologies, some of which we'll buy or license and some which we'll develop ourselves that conform to the total architectural approach that Dean described. What we're doing with HP Fortify is a perfect example of that very deliberate and methodical approach.

Gardner: It sounds as if an important pillar of those three items you brought up, Sam, the common strategy, unified capability, and architecture, is to know yourself as an organization, to deeply understand where you are, and then be dynamic in terms of tracking that. Do the HP Fortify and HP ArcSight technologies come to bear on that aspect of self-awareness?

Visner: The way I would put it is this. We have to deal with a situation in which we have a broad set of industries that we serve from a cybersecurity perspective. I'm going to take a look at the ArcSight situation here more particularly, because the ArcSight situation is one that had to serve CSC and its customers on a global basis.

Wide range of environments

We do cybersecurity for public-sector organizations, but we also do it for chemical companies, banks, aerospace and defense companies, manufacturing companies, and companies in the healthcare space.

We have to be able to bring together data across a very wide range of environments. Although there are some great global threats out there, some of those threats are being crafted to be specific to some of the industries and some of the government’s activities that we try to safeguard.

Therefore, in the case of ArcSight, we needed an environment that would allow us to use a broad range of tools, some of which may have to be selected to be fit for purpose for a specific customer environment and yet to accrue data in a common environment and use that common environment for correlation and analysis.

This is a way in which our self-awareness as a company that does cybersecurity across many sectors of the private sector, as well as a broad range of public sector organizations, told us that we needed an environment that could accrue a wide range of data and allow us to do correlation.

In terms of what we're doing with Fortify and application security testing,  one of the things we've learned about ourselves is that we're going to support organizations that have very specific applications requirements. In some cases, these requirements will relate to things like healthcare or banking. In some cases, it will be for transactions. In some cases, it will be specific workflows associated with these industries.
We are trying to raise the bar globally to one, high, common level of application security testing.

What’s common to this, we have learned, is the need for secure applications. What’s also common is that globally the world isn’t doing enough in terms of testing the security of applications. This is something we found we could do that would be of value to a broad range of CSC customers. Again, that's based on our own self-awareness of what those customers need in our history.

Remember, our company has been doing independent IT and software work since 1959. One of the things we've learned over 54 years is that there is a wide variety of things that organizations do in terms of making their software really useful, and there is a wide variety in the attention they pay to testing that software from the perspective of security.

We are trying to raise the bar globally to one, high, common level of application security testing. So that’s a way that we are working with it. That’s what the Fortify tool will help us do.

Gardner: Dean Weber, to Sam’s point about the amount of data required to track, understand, and follow, do you consider this a big-data function? We hear, of course, a lot about that in the marketplace these days. How important would general-data and/or big-data capabilities be in a good secure organization? Are they hand in hand?

Weber: They are absolutely hand in hand. As we generate more data across our grids, both sensor data and event data, and as we combine our information technology networks with our operational technology networks, we have an exploding data problem. No longer is it finding a needle in a haystack. It’s finding a needle amongst needles in a haystack.

Big-data problem

The problem is absolutely a big-data problem. Choosing technologies like ArcSight that allow us to pinpoint technology aberrations from a log, alert, or an event perspective, as well as from a historical trending perspective, is absolutely critical to trying to stay ahead of the problem. At the end of the day, it’s all about identity, access, and usage data. That's where we find the indicators of these advanced threats.

As the trade craft of our opponents gets better, as Sam likes to put it, we have to respond, and it’s not easy to respond at that level. One of the reasons that Fortify is going to become one of the cornerstones of our offering is because as we get better at securing infrastructure using the technologies we've already talked about, the next low-hanging fruit is the application vulnerabilities themselves.

Recently, Android announced that they have a vulnerability in their crypto product. There are 900 million Android products that are affected by that. While Google has released a patch for that particular crypto vulnerability, all the rest of the vendors who use an Android platform are still struggling with how to patch, when to patch, where to patch, how do they know they patched.

Visner: And who is responsible for the patch?

Weber: And who is responsible for the patch, absolutely true.
It’s not enough to know that I have got good governance, risk, and compliance (GRC) enterprise-wide password maintenance and password reset.

Gardner: That brings us to this. When you talk about responsibility and tracking, who is doing what and how it’s getting done? We started to talk about key performance indicators (KPIs). How much of a shift have you had to go about there at CSC to put in place the ability to track metrics of success and KPIs? How do you measure and gauge these efforts?

Visner: I'm going to ask Dean to cleanup on my answer, but a lot of people are paying attention to global threat intelligence and threat attribution. That’s really important, but I think what’s even more important is not knowing where the threat came from, or what the motivations are. That’s useful to know, because it can help characterize other aspects of the threat and what you can expect from the threat actor to do, not just in terms of one piece of malware, but an integrated approach.

The other piece of this is understanding yourself. That is to say it’s not enough to know that I have patched my desktop. It’s not enough to know that I have got good governance, risk, and compliance (GRC) enterprise-wide password maintenance and password reset.

I have to know everything about my enterprise today, all the way down to the industrial control systems on the shop floor, the supervisory control and data acquisition systems that coordinate my enterprise, the enterprise databases and applications that I use for global transactions, as well as individual desktops and smartphones.

What we're really talking about is a level of awareness that people are not used to having. They're really not. People don’t worry about what goes on beyond their own computer. Even CIOs haven’t really worried about the cybersecurity of computers that are embedded in manufacturing systems or control systems. Now, I think they have to be.

Swinging back to the awareness question, this is required of us and of any other enterprise to go beyond the status of an individual device to treat the status of the entire enterprise as important corporate knowledge. That's important corporate knowledge.

Holistic global view

Think of it this way, this is an organization that needs to know globally what its credit worthiness is, where its lines of credit are, and how it’s using those lines of credit and its cash instruments globally to manage its cash flow. That’s important corporate knowledge, and it has to be dealt with on a holistic global view. Otherwise it’s worthless.

The same thing is true with cybersecurity, knowing what the effect is. Cybersecurity of a specific server is interesting, but it's actually not nearly as useful as knowing the state of cybersecurity throughout your entire enterprise. That's global corporate knowledge and that's the difference between a piece of information which is interesting and corporate knowledge which is vital, important, and very valuable.

We have to treat the state of cybersecurity in an organization with the same seriousness, and consider it to be the same level of resource and asset, as the global cash flow of a global organization. It's the same thing.

Gardner: Dean Weber, the opportunity to bring big-data capabilities to bear on this problem is one thing that we've addressed, but there is also the operations and organizational side of having reports, delivering reports, measuring those reports, and being able to act on it.
We have to treat the state of cybersecurity in an organization with the same seriousness, and consider it to be the same level of resource and asset, as the global cash flow of a global organization.

What have you done there to allow for a KPI-oriented or a results-oriented organizational approach that leverages of course all the data?

Weber: You've just touched on the value proposition for a global managed security services provider (MSSP) in the fact that we have data sources that span the planet. While CSC as a 90-plus thousand person organization is considered a large scale organization, it pales in comparison to the combined total of CSC's customer base.

Being able to combine intelligence and operational knowledge from multiple enterprises spanning multiple countries and geographic regions with differing risk postures and business models, sometimes even with differing technologies employed in those models, gives us a real opportunity to see what the global threat looks like.

From the distribution of that threat perspective our ability to, within the laws appropriate across the globe and auditable against those laws, share that threat intelligence without rushing up against or breaking those laws is very important to an organization. This ultimately keys to the development of the value proposition of why do business with the global MSSP in the first place.

Gardner: It was interesting to me when Sam said that there's no difference between understanding your financial situation and your security posture. Is there some opportunity for security and cybersecurity to be a driver for even better business practices?

Now, you might start employing these technologies and putting in place these operational capabilities because of an existential threat to your security, but in doing so, it seems to me that you're becoming a far better organization along the way. Have any customers, or have you yourself, been able to demonstrate that taking the opportunity to improve your cyber posture also improves your business posture?

Not well managed

Weber: That's becoming evident. Not everybody gets it yet, but more and more people do. The general proposition is that an organization that doesn't understand, for example, its financial position is not well-managed and isn't a good investment. It probably can't mobilize its resources to support its customers.

It isn't in a position to bring new products to market and probably can't support those products. Or it might find that those product lines are stolen, manufactured at a lower standard by somebody else, and not properly supported, so that the customer suffers, the company suffers, and everybody but the cyber thief suffers.

A financial organization that can't take care of their own financial position can't serve their customers, just as an organization that doesn't understand its cybersecurity posture can't preserve value for shareholders and deliver value for its customers.

Gardner: Dean, looking at this same benefit, what you do for cybersecurity benefits extend to other business benefits, is there a return on investment (ROI) impact where you could measure the investments made for extensive security but then leverage those capabilities in other ways that offset the price. Has that been the case for you or are you aware of anyone that's done the bean counting in such a fashion?
Where the rubber hits the road is more along the lines of keeping the CEO and the CFO out of jail when they have to sign off on things like Sarbanes–Oxley.

Weber: There absolutely is an ROI in security. In fact, there is actually a concept of return on security investment (ROSI), but I would say generally that most people don't really understand what those calculations mean.

Where the rubber hits the road is more along the lines of keeping the CEO and the CFO out of jail when they have to sign off on things like Sarbanes–Oxley. Or the fact that you don't have to make an SEC filing as a result of financial-systems breach that impacts your ability to keep revenues that you may have already attained.

The real return on investment is less measured in savings than it is in -- as Sam likes to say -- keeping us off the front page of "The Wall Street Journal" above the fold, because the real impact to these things traditionally is not in the court of law, but in the court of public opinion.

They tend to look at organizations that can't manage themselves well and end up in the news at not managing themselves well, less favorably than they do for companies that do manage their operations well.

Visner: What is a pound of cybersecurity worth? I'll put it to you this way. What is a pound of stolen intellectual property worth? That that intellectual property means that somebody else is stealing patient data, manufacturing your products, or undermining your power grid.

One way of thinking is that it's not the value of the cybersecurity so much, but the diminished value of the assets that you would lose that you could no longer protect.

Measuring ROI

That’s as good a place as any to measure that ROI. If you do measure that ROI, the question is not how much are you spending on cybersecurity. The question is what would you lose if you didn’t make that spend. That’s where you see the positive return on investment for cybersecurity, because for any organization, the spend on cybersecurity is almost insignificant compared to the value that would be lost if you didn’t make that spend.

When you think about what it cost to bring to market a product, a new pharmaceutical, a new aircraft design, a new jet engine, and what happens if somebody gets there first or undermines your intellectual property, the value of that intellectual property towards what people are prepared to spend and protect is worth it.

Gardner: As we take the lessons internally, can you offer some recommendations for how others could proceed? Are there any aspects of what you've done with HP internally at CSC that maybe provide some stepping stones? What would you recommend in terms of first steps, initial steps, or lessons learned that others might benefit from in terms of what you've done?

Visner: The real question is not what we've done internally, but the internal process we used, for example, in deciding to work with a specific strategic partner. We recognized early on that this is not a one company problem.
This is a problem where we are dealing with weapons grade threats from organized criminals who have vast resources at their disposal.

This is a problem where we are dealing with weapons grade threats from nations-state. This is a problem where we are dealing with weapons grade threats from organized criminals who have vast resources at their disposal. This is a problem of intellect, and therefore, no one organization is going to have sufficient intellect to be able to deal with this problem globally.

As a company, CSC tends to seek out partners to whom we can couple our intellect and get a synergistic result. In this case, the process of making that relationship real when it flows through defining our portfolio, defining the services that comprise the portfolio, managing the development of those services through our offering lifecycle management process, and then choosing companies whose technology provides the needed strength for each one of those offerings, each one of the elements of that portfolio.

In this case, that process serves us well, because we're going to need a wide range of technology. Nobody is in a position to confront this problem on their own -- absolutely nobody. Everybody needs partners here. But the question is whom?

We have people show up on our doorstep with ideas and technologies and products every day. But the real issue is, what is a good organizing principle? That organizing principle has two components. One, you need a wide range of capabilities, and two, you need to choose from among the wide range of technologies you need for that wide range of capabilities. You need a process that’s disciplined and well-ordered.

Believe me, we have people show up and ask why it takes so long, why it's such an elaborated process, and can't you see that our product is absolutely the right one.

The answer is that it's like a single hero going out onto the battlefield. They maybe a very effective fighter, but they're not going to be able to master the entirety of the battlefield. That can't be done. They're going to need partners. They're going to need mates in the field. They're going to need to be working alongside other people they trust.

Strategic partner

So in working with HP and the ArcSight tool as our security information and management player of our global logical SOC, our global logical managed cybersecurity service, and in working with HP Fortify we chose a partner we thought -- and we think correctly -- is a strong long-term strategic partner.

It's somebody with whom we can work. HP recognizes that we do. They're not going to solve this problem on their own. What one company is going to solve a problem on their own when they are up against the global environment of nation-state and trade actors? We all need these partnerships.

Our company is unique in that we've always looked to our partner relations for key technologies to enable offerings in our portfolio.

We've always believed that you go to market and you serve your customers with strategic partners, because we've always believed that every problem that had to be solved would require not only our abilities as an integrator, but the abilities of our partners to help in the development of some of this technology. That’s what makes the most sense.

For a company like CSC that is largely technology-independent, it gives us access to a wide range of technology partners. But as a company, we're smart about the partners that we choose because of the technologies that we have. Although there's a wide range of potential partners, we work with companies that we think are going to be long-term strategic partners against high-value problems and challenges -- in this case HP and cybersecurity respectively.

Gardner: Last word to you, Dean. Just based on your experiences, as the Chief Technical Officer increasing and improving your security posture, are there any lessons learned that you could share for others that are seeking the same path?
Although there's a wide range of potential partners, we work with companies that we think are going to be long-term strategic partners against high-value problems and challenges.

Weber: I'll leave you with two thoughts. One is again the value proposition of doing business with a global business MSSP. We do have those processes and processes in our background where we are trying to bring the best price-performance products to market.

There maybe higher-priced solutions that are fit for purpose in a very small scale, or there may be some very low-price solutions which are fit for purpose in a very large scale, but don't solve for the top-end problems. The juggling act that we do internally is something that the customer doesn't have to do, whether that’s the CSC internal account or any of our outside paying customers.

The second thing is the rigor with which we apply the evaluation process through an offering lifecycle or product lifecycle management program is really part and parcel of the strength of our ability to bring the correct product to market in the correct timeframe and with the right amount of background to deliver that at a level of maturity that an organization can consume well.

Gardner: Well, great. I'm afraid we'll have to leave it there. We've been exploring how IT leaders are improving security and reducing risks as they adapt to the new and often harsh realities of doing business online and we've been learning through the example of CSC itself.

I’d like to offer a huge thanks to our guests. We've been here with Dean Weber, Chief Technology Officer for CSC Global Cybersecurity. Thank you, Dean.

Weber: Thank you.

Gardner: And also Sam Visner, Vice President and General Manager for CSC Global Cybersecurity. Thank you so much, Sam.

Visner: It's been a pleasure. Thank you for having us.

Gardner: And you can gain more insights and information on the best of IT performance management at www.hp.com/go/discoverperformance. And you can always access this and other episodes of our HP Discover Performance podcast series on iTunes under BriefingsDirect.

I'm Dana Gardner, Principal Analyst at Interarbor Solutions, your host and moderator for this ongoing discussion of IT innovation and how it's making an impact on people’s lives.  Thanks again for listening, and come back next time.

Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: HP.

Transcript of a BriefingDirect podcast on the growing need for cybersecurity as an important organizational goal for businesses and government agencies. Copyright Interarbor Solutions, LLC, 2005-2013. All rights reserved.

You may also be interested in:

    Thursday, August 29, 2013

    Spot Buying Automated by Ariba Gives Start-Up Koozoo a Means to Shop Efficiently

    Transcript of a BriefingsDirect podcast on how spot buying and the Ariba Network has given a startup firm a leg up on procurement needs.

    Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: Ariba, an SAP company.

    Dana Gardner: Hello, and welcome to a special BriefingsDirect podcast series coming to you from the recent 2013 Ariba LIVE Conference.

    Gardner
    We're here to explore the latest in collaborative commerce and to learn how innovative companies are tapping into the networked economy. We'll see how they are improving their business productivity and sales, along with building far-reaching relationships with new partners and customers.

    I'm Dana Gardner, Principal Analyst at Interarbor Solutions, and I'll be your host throughout the series of Ariba-sponsored BriefingsDirect discussions. [Disclosure: Ariba is a sponsor of BriefingsDirect podcasts.]

    Our next innovator case study focuses on how the spot-buying process is benefiting buyers and sellers, and how they're using the Ariba Network and Discovery to conduct tactical buying.

    Here to explain the latest and greatest around how they have executed on agile procurement, we're joined by Ian Thomson, Koozoo’s Head of Business Development, based in San Francisco. Welcome, Ian.

    Ian Thomson: Thank you, very much.

    Gardner: First, Ian, tell us a little about Koozoo. What do you do? Why are you interested in buying and selling more stuff?

    Thomson
    Thomson: Koozoo is a technology company based in San Francisco, and we are the easiest way to share a live view with someone in particular or a broader community. We have built a very simple web application that converts your old smartphone into a geolocating webcam.

    Gardner: What do you mean by "view." If I have upgraded my iPhone, and I have this old one, what would I use you to do with it?

    Thomson: You would pull the old one out of your sock drawer, or whatever drawer that you have it in, and you dust it off. You go over to your WiFi network and download the Koozoo application, and that now makes your phone a webcam that you can stream and point to a website, if you had a website that you wanted to display it on, or on to the Koozoo site, where it could be private for your consumption.

    On a personal level, it could be to make a baby monitor or something like that for a limited community, like a neighborhood watch group or merchant association that wanted to share their views or more broadly on the Koozoo community.

    Happening around town

    If you look at Koozoo, it looks like we're making equivalent of Google Street View, but live. Right now, we're limited to San Francisco, but were able to see what's happening around town.

    Gardner: That’s really interesting. There is plethora of end devices that have cameras and WiFi, and you're able to then take advantage of that and give people the opportunity to innovate around the notion of either public or private streams. Is it just live stream? How can people just take a photo view every minute or six minutes, or anything like that?

    Thomson: Not just yet, but that is certainly the direction we are moving in terms of building an ecosystem that allows you to make alerts for a certain movement or alerts when there are certain sounds that are anomalous, and are ones that you would want to record or see. But now, it's just an ambient streaming.

    Gardner: So you're a startup -- resource constrained is, I believe, the way people would refer to that -- and you still need to buy and sell goods and services. When you were tasked with something that wasn’t a strategic, organized, or recurring type of purchase, how did you find what you needed, and how did Ariba factor into that?

    Thomson: We're not really a buying organization per se. We're an engineering-based company. We have very few people and, when we need to buy something, it's usually something like walking over to Office Depot and picking up a couple of pencils, because we need pencils.
    As I got smarter about what I needed, I was able to communicate that with the potential vendors.

    Primarily, we had been looking at Amazon for that sort of purchase. As soon as we needed to purchase a few more things, we moved from pure retail to more of a wholesale sort of a buyer. We needed to buy more phones to do testing on. We looked at Alibaba and we looked at Amazon, primarily because I had only heard of those two, to buy larger quantity of used mobile phones in this case, because I wanted to take advantage of refurbished phones being more cost-effective for us for testing.

    Gardner: You had a need for buying used end-point devices, mobile phones, smartphones, what have you. How did you find Ariba and how did you begin the process?

    Thomson: Initially I found Ariba through an introduction. Somebody said, "If you're looking at Alibaba, why don’t you look at Ariba? It's more suitable for what you're looking for." And it certainly turned out to be the case.

    Initially, we made that one purchase and subsequent purchases of mobile devices. It turned out to be a really good mechanism for doing some market analysis. I didn't know what I was buying. I'm not a mobile device expert, and I don’t come from consumer electronics.

    I was able to learn about what it was I didn’t know and be able to iterate on my request for a purchase. I was able to iterate on that publicly, so that everybody got to see. As I got smarter about what I needed, I was able to communicate that with the potential vendors.

    Sense of confidence

    Gardner: Because we're here at Ariba LIVE, the conference, we've been hearing news from Ariba about spot buying as a capability they're investing in and delivering through their network and Discovery process. Is there something about having a pre-qualified list of suppliers that in some way benefited you or gave you a sense of confidence vis-à-vis going just on the open World Wide Web.

    Thomson: I don’t mean to be disparaging, but that was a little bit of the experience on Alibaba. I did get a ton of responses that weren't necessarily qualified and they weren't qualified, because they hadn’t read my request very clearly. They were offering me something that clearly wasn’t supporting what I needed, but rather was supporting what they were trying to sell.

    I had done some Google searches and tried to find vendors, whether it was for these used devices or for a specialized widget that I needed to have made and sourced. So doing that on Google was pretty tough, time consuming, and something that I wasn’t expert at.

    I didn’t have the capability to ask the right questions. I didn’t even know whether I was in the ballpark of what expectations should be in terms of time for delivery, cost, or what an acceptable small batch really was, because initially I needed a small batch to test the product that I was developing.
    I see how we could position our profile on Ariba Discovery to respond to inbound interest on that platform for something that we could solve.

    Gardner: Since you've found Ariba, have you been using it for other procurement, and do you suspect that over time as you grow that more of that strategic buying capability might be of interest to you?

    Thomson: Maybe. I don’t really see us ever becoming a very large buying organization. If we continue to develop this product, we already have a group of two or three suppliers that we've developed our relationship with over Ariba Discovery, which is the the spot buying platform that they have.

    I don’t know if I necessarily would need more. I don’t know what our procurement needs are going to be moving forward. We're a little bit more interested in looking at it as a way to respond to potential leads. I'm on the sales side, not on the procurement side of our company.

    As I look at moving forward, we do need to capture new leads. I see how we could position our profile on Ariba Discovery to respond to inbound interest on that platform for something that we could solve, whether that’s a surveillance system, a public safety system, or something like that. We would certainly be a very cost effective solution for that. So to be able to respond to inbound interest could be a very good place for us to go.

    Gardner: So, it's a two-way channel. You were able to use Ariba Discovery and spot buying to find goods and services quickly and easily without a lot of preparation and organization, and conversely, there might be a lot of buyers out there using Ariba Discovery looking for a streaming capability and you would be popping up on their lists. Have you done that yet? What's the plan?

    Product-development cycle

    Thomson: That would be the hope, that there are a lot of people that want to buy it and use it. I haven't focused on that just yet. As a company, we're in a product-development cycle, not really in the business development sales cycle just yet. Ariba could be a very good way of figuring out what the market wants.

    Gardner: So, it's not just a sales execution channel, but also a market research and business development channel, finding out what's available. You don’t know what people want, until you get it out in front of them, and of course, the spend for doing that through advertising or direct marketing is pretty daunting. Something like Ariba Discovery gives you that opportunity to do sales and research at no cost.

    Thomson: It certainly does.

    Gardner: Just to tease it out a bit more, because it's very interesting to me, did the devices that are supportive for you include the Android and iOS or are there others. If I wanted to download your app, what device would I need or at what prices would it be available to me?
    You don’t know what people want, until you get it out in front of them, and of course, the spend for doing that through advertising or direct marketing is pretty daunting.

    Thomson: Right now, we support the iOS suite, an iPad or an old iPhone, later than the 3GS generation. Before that, they didn’t have the necessary hardware components, the chip set, to support live streaming the way we do live streaming with encoding.

    We are on some Android platforms, but Android is a very fragmented market, and as you develop toward Android, you have to keep that in mind. So we focus on certain platforms within the Android market first. As we define this product market fit, we will develop the app and then propagate the Android market.

    Gardner: Well, very good to learn about you, and it's impressive on how you've been able to leverage spot buying, and there is the potential for you to have spot selling.

    Thomson: Yes, sure.

    Gardner: Great. We've been talking about the mounting need for spot buying and how a company in San Francisco, a startup has benefited from making this a new competency. Please join me in thanking our guest Ian Thomson, Koozoo’s Head of Business Development. Thank so much, Ian.

    Thomson: Thank you.

    Gardner: And thanks to our audience for joining this special podcast coming to you from the 2013 Ariba LIVE Conference in Washington D.C.

    I'm Dana Gardner; Principal Analyst at Interarbor Solutions, your host throughout this series of Ariba sponsored BriefingsDirect discussions. Thanks again for listening, and come back next time.

    Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: Ariba, an SAP company.

    Transcript of a BriefingsDirect podcast on how spot buying and the Ariba Network has given a startup firm a leg up on procurement needs. Copyright Interarbor Solutions, LLC, 2005-2013. All rights reserved.

    You may also be interested in:

    Wednesday, August 28, 2013

    Advanced IT Monitoring Delivers Predictive Diagnostics Focus to United Airlines

    Transcript of a BriefingsDirect podcast on how HP tools helped facilitate a giant airline merger that brought many IT systems and application together.

    Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: HP.

    Dana Gardner: Hello, and welcome to the next edition of the HP Discover Performance Podcast Series. I'm Dana Gardner, Principal Analyst at Interarbor Solutions, your moderator for this ongoing discussion of IT innovation and how it’s making an impact on people’s lives.

    Gardner
    Once again, we're focusing on how IT leaders are improving their services' performance to deliver better experiences and payoffs for businesses and end users alike, and this time we're coming to you directly from the recent HP Discover 2013 Conference in Las Vegas.

    Our next innovation case study interview highlights how United Airlines demanded better performance and monitoring from IT -- and got it. We'll see how United not only had to better track thousands of systems and applications from its newly merged company, but it also had to dig deeper and orchestrate an assortment of management elements to produce the right diagnostic focus, and thereby reduce outages from hours to mere minutes.

    We'll learn more about how United has gained predictive monitoring and more effective and efficient IT performance problem solving from our guest, Kevin Tucker, Managing Director of Platform Engineering at United Airlines. [Disclosure: HP is a sponsor of BriefingsDirect podcasts.]

    Kevin Tucker: Thanks for having me.

    Gardner: We're glad you're here. It seems that your situation could be easily summed up as an issue of scale. You have thousands of applications. You had major companies, big, big companies coming together, with Continental and United.

    Tell me about how IT also was a scale issue. You're not only dealing with applications and platforms. You're dealing with IT staff, culture, and departments. Maybe you can help us understand the challenge that you faced as you tried to make things better and your performance improve.

    Tucker: As you stated, the airline industry is one of the most complex IT environments in existence. I think it's really difficult for the average flyer to understand all of the logistics that have to happen to get a flight off the ground.

    Tucker
    There are millions of messages moving through the system, from weight and balance, to reservation changes. There's the Network Operations Center (NOC) that has to make sure that we're on time with slots. There are fuel concerns. We have to ensure that with all of the connections that are happening out there that, the flights that feed into our hubs carrying our passengers get in on time, so that folks can make their connecting flights.

    Moving people around is a very serious business. I have had people say, "Why do you guys take it so seriously? You're not launching nukes, or you are not curing cancer." But at the end of the day, people are counting on us to get them from point A to B.

    That might be the CEO that’s trying to go out and close a big business deal. It might be someone trying to get to see an ailing family member, or someone who's lined up for what could be a life-changing interview. It's our job to get them there on time, in a stress-free manner, and reliably.

    Gardner: Back to the scale issue, it's obviously a daunting task, but to an IT department, what are you dealing with in order to pull all these resources together, to make the applications that really are what drive many of these processes?

    Complex environments

    Tucker: We've had a very challenging last couple of years. We recently took two large, complex IT environments and merged them. We picked some applications from Continental, some applications from United, and we had to make these applications interface with each other when they were originally never designed to do so. In the process, we had to scale many of these systems up, and we did that at an incredible pace.

    Over and above that, with the complex challenges of merging the two IT systems, we had this phenomenon that's building in the environment that can't be denied, and that's the explosion of mobile. So it was really a perfect storm for us.

    We were trying to integrate the systems, as well as stay out in front of our customer demands with respect to mobile and self-service. It became a daunting challenge, and it became very apparent to us going in, that we needed good vital signs for us to be able to survive, for us to be able to deliver that quality of service our customers come to expect from us.

    From my perspective, I have several customer sets. I have the executives. We don’t really know how we're doing if we can't measure something. So we need to be able to provide them metrics, so that they understood how we were running IT.

    I have the United employees, and that could be the line mechanic, to the gate agent, to the lobby agent. And then we have our flyers. And all of those people deserve reliable data and systems that are available at all times. So when you factor all of that in, we knew we needed good vital signs, so that we could ensure these applications were functioning as designed.
    We brought HP to the table and told them that we don't want to be average. We want to be world-class.

    We didn't get there as fast as we would like. It was quite a feat to integrate these systems and we landed on a collapsed Passenger Service System (PSS) system back in March of 2012. Unfortunately, given that we were a little late to the game, we had some tough days, but we rallied. We brought HP to the table and told them that we don't want to be average. We want to be world-class.

    We created a battle plan. We got the troops energized. We deployed the power that's available to us within the HP Management Suite. We formed a battle plan and we executed that.

    It wasn't without challenge, but we are very proud of the work that we've done in a very short period of time. Within an eight-month journey, we have gone from being average at best, to I think one of the best around, with the stuff we have gotten after.

    So it can be done. It just takes discipline, commitment, and a will to be the best. I'm very proud of the team and what they've accomplished.

    Gardner: Kevin, I like the way you refer to this as "vital signs." When you put in place the tools, the ability to get diagnostics, when you had that information at your fingertips, what did you see? Was it a fire hose or a balanced scorecard? What did you get and what did you need to do in order to make it more actionable?

    Using all the tools

    Tucker: We own quite a bit of the HP product set. We decided that in order to be great, we need to use all of the tools on our tool belt. So we had a methodical approach. We started with getting the infrastructure covered. We did that through making sure SiteScope was watching servers for health. We made sure the storage was monitored, the databases are monitored, the middleware components, the messaging queues, etc., as well as all of the network infrastructure.

    What really started to shine the light on how we were performing out there, as we started rolling all of those events up and correlating them into BSM, was that we were able to understand what impact we were having throughout the environment, because we understood the topology-based event correlation. That was sort of the first model we went at.

    You mentioned diagnostics. We started deploying that very aggressively. We have diagnostics deployed on every one of our Java application servers. We also have deployed diagnostics on our .NET applications.

    What that has done for us is that we were able to proactively get in front of some of these issues. When we first started dabbling in diagnostics, it was more of a forensics type activity. We would use that after we were in an incident. Now we use diagnostics to actually proactively prevent incidents.
    In many cases we have gotten many of those restorals down in under five minutes, where before it was way north of an hour.

    We're watching for memory utilization, database connection counts, and time spent in garbage collection, etc. Those actually fire alerts that weave their way through BSM. They cut a Service Manager ticket, and we have automation that picks that Service Manager ticket up, assumes ownership, goes out and does remediation, and refreshes the monitor. When that’s successful, we close the ticket out, all the while updating the Service Manager ticket to ensure we're ITIL compliant.

    In many cases we have gotten many of those restores down in under five minutes, where before it was way north of an hour.

    Through the use of these tools, we have certainly gained better insight into how our applications are using database connections and how much time we're spending in garbage collection. It really helps us tune, tweak, and size the environments in a much more predictive fashion versus more of a guess. So that's been invaluable to us.

    You're probably picking up on a theme that's largely operationally based. We've begun making pretty good inroads into DevOps, and that's very important for us. We're deploying these agents and these monitors all the way back in the development lifecycle. They follow applications from dev to stage, so that when we get to prod, the monitors we know are solid. Application teams are able to address performance issues in development.

    These tools have really aided the development teams that are participating in the DevOps space with us.

    Gardner: HP does have a lot of product on the development test and deploy side of things, and also a lot of management and capabilities on the production side. Is there something about the ability for HP to span across these activities that led you to choose them and how did you decide on them versus some of the other alternatives?

    Clear winner

    Tucker: When we merged and got through the big integration I spoke of last year, clearly, we were two companies. We had two products. It became very clear to us without a doubt that because HP's depth and width that they could provide us across stacks and within those stacks, being able to go up and down, they were the clear winner.

    Then when you start further looking at, well, why are we reinventing the wheel once something gets to production. When you look at the LoadRunner scripts, VuGen scripts that are created back in the development and the quality assurance (QA) cycle. Well, those are your production monitors and it prevents us from having to perform double work, if you will.

    That's a huge benefit that we see in the suite. When you couple that with the diagnostic type information I referred to, that's giving our development teams great insight way back in the development cycle. As you look at the full lifecycle, the HP toolset allows you to span development stage into production and provide a set of dashboards that allow for the developers to understand how their sets of service are running.

    We were very quickly able to bring them on board, because at the end of the day, there's the human factor that sets in. What's in it for me? I hear you ops and engineering guys telling me we need to monitor your application, but when you peel it back, I'm harkening back to my days when I used to run software.

    Developers are busy and when you show them value that the director of the middleware services or business services has a dashboard, he can go look at how his services are performing. They very quickly identify that value and they're very keen on not getting those calls at 3 o’clock in the morning.
    There was no doubt in our mind as we started down our journey that the HP toolset just couldn't be rivaled in that space.

    It's a slam-dunk for us, and as I say, there was no doubt in our mind as we started down our journey that the HP toolset just couldn't be rivaled in that space.

    Gardner: You’ve been able to take problem times from hours to minutes. HP has recognized that, and you’ve won an award here at HP Discover. Tell me a little about that and how you are sharing some of the responsibility. You mentioned your team and you're proud of it.

    Tucker: Yes, we're very proud of our accomplishment. We're living proof. We're in a complex, fast-moving industry. We were starting from much further behind than we would have liked to, and we bought off and believed in the tools. We used them partnering with HP and we were able to come a long way.

    What really started moving the dial for us with respect to remediation time and lowering mean time to restore (MTTR) and drastically improving our availability is the use of diagnostics. It's automated restores for things that we can. We can't restore everything automatically, but if we can take the noise away so our operations teams can focus on the tough stuff, that's what it's all about with the BSM TBEC (Topology Based Event Correlation) views, the event-based correlation.

    Before, as we were making our journey, we started very quickly getting good at identifying an issue before the customer called in. That was not always the case. And that's step one. You never want a customer calling in and saying, "I want to let you know your application is down," and you say, "Thank you very much. We'll take a look at that."

    Very difficult

    That shaves a few minutes, but honestly then the Easter egg hunt starts. Is it a server, a network, a switch, the SAN, a database, or the application? So you start getting all of these people on the phone, and they start sifting through logs and trying to understand what this alert means with respect to the problem at hand. It's very difficult when you have thousands of servers and north of a thousand applications spread across five data centers. It's just very difficult.

    Through the use of correlated views, understanding the dependencies, and the item within the infrastructure that's causing the problem turning red and bubbling up to the other applications that are impacted, allows us to zero in and fix that issue right off the bat, versus losing an hour of getting people on checking things to figure out is it them or is it not.

    So through automating what can be automated with restore and having the event-based correlation that is what caused our operational performance we go from what I would call maybe a D- to an A+.

    Gardner: Congratulations on the award. It's very impressive. Let's also talk about some other types of paybacks. From the investments you make, you're getting payback in terms of your brand being better preserved, customer satisfaction, speed, and performance. When people click and they can buy a ticket, that's revenue, and that’s very clear to measure.
    It's allowed us to step back and start working on engineering with respect to how we utilize our assets.

    But it seems to me that this lifecycle approach across DevOps, puts you in a better position to avail yourself of things like hybrid cloud models, where you need to move workloads to other types of environments or security, where now you are able to look in your systems when there is an event correlation that has a security issue attached, rather than just performance, or both.

    Are you really now in a better position to move into some other areas around the types of the environments for your production, as well as security or maybe there are some others that I haven’t thought of that you're now able to pursue because of what you've been doing?

    Tucker: As we've matured and have insight into our environment with metrics, we're able to stop the firefighting mode. It's allowed us to step back and start working on engineering with respect to how we utilize our assets. With all of this data, we now understand how the servers are running. We understand, through getting engaged early in DevOps with some of the rich information we get through load testing and whatnot, we're able to size our environments better.

    As part of that, it gives us flexibility with respect to where we place some of these applications, because now we're working with scientific data, versus gut feel and emotion. That's enabling us to build a new data center and, as part of that, we're definitely looking at increasing our geographic disbursement.

    The biggest benefit we're seeing, now that we have gotten to more or less a stable operation, is that we're able to focus in on the engineering and strategically look at what our data center of the future looks like. As part of that, we're making a heavy investment in cloud, private right now.

    We may look at bursting some stuff to the public side, but right now, we're focused on an internal cloud. For us, cloud means automated server build, self-service, a robot that’s building the environment so that the human error is taken out. When that server comes online, it's an asset manager, it's got monitors in place, and it was built the same way.

    Now that we are moving out of the firefighting mode and more into the strategic and engineering mode, that's definitely paying big dividends for us.

    Gardner: Very good. I'm afraid we will have to leave it there. We've been learning about how United Airlines has demanded better performance from its IT organization and has gotten it. And we've seen how they have orchestrated an assortment of management elements to produce the right diagnostic focus and reduce outages from hours to mere minutes.

    So join me in thanking our guest, Kevin Tucker, Managing Director of Platform Engineering at United Airlines. Thank so much.

    Tucker: Thank you. It’s great to be with you.

    Gardner: And thanks you to our audience for joining this special HP Discover Performance Podcast coming to you from the HP Discover 2013 Conference in Las Vegas.

    I'm Dana Gardner; Principal Analyst at Interarbor Solutions, your host for this ongoing series of HP sponsored discussions. Thanks again for joining, and come back next time.

    Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: HP.

    Transcript of a BriefingsDirect podcast on how HP tools helped facilitate a giant airline merger that brought many IT systems and application together. Copyright Interarbor Solutions, LLC, 2005-2013. All rights reserved.

    You may also be interested in: